HAL Id: hal-01228346
https://hal.archives-ouvertes.fr/hal-01228346
Submitted on 16 Nov 2015
HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.
L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
A Dynamic Random Graph Model for
Diameter-Constrained Topologies in Networked Systems
Luigi Alfredo Grieco, Mahdi Ben Alaya, Thierry Monteil, Khalil Drira
To cite this version:
Luigi Alfredo Grieco, Mahdi Ben Alaya, Thierry Monteil, Khalil Drira. A Dynamic Random Graph
Model for Diameter-Constrained Topologies in Networked Systems. IEEE Transactions on Circuits
and Systems II: Express Briefs, Institute of Electrical and Electronics Engineers, 2014, 61 (12), pp.882-
886. �10.1109/TCSII.2014.2362676�. �hal-01228346�
A Dynamic Model for Diameter Constrained Networked Systems
Luigi Alfredo Grieco, Senior Member, IEEE, Mahdi Ben Alaya, Thierry Monteil, and Khalil Drira
Abstract—Random graphs have been widely investigated in literature because of their relevance to many scientific domains.
In this brief, the attention is focused on diameter constrained random graphs, useful to analyze unstructured overlays for delay bounded network applications and systems. To this end, a general process of arrivals is considered to describe the sequence of vertex couples (i.e., node couples) among which a path composed of no more than D edges (i.e., links) has to be established. Accordingly, a topology formation mechanism M is formulated, expressing the rules that drive the addition of new edges, obeying to the constraint on the maximum diameter D. Third, using graph theoretic arguments, an original discrete time model is proposed that describes the evolution of the average network degree (i.e., the number of edges per node) subject to M and D. Fourth, the model is successfully validated using computer simulations in a wide range of scenarios (with up to 2
16nodes). Finally, concrete examples are provided to illustrate useful applications of the proposed approach, also in the presence of link failures.
Index Terms—Graph theory, Topology, Networks, Overlay.
I. I NTRODUCTION
Graph-based models are fundamental tools to assess, pre- dict, and control the performance of complex systems, made of interacting dynamic units. In these systems, vertice are usu- ally associated to the dynamic units whereas edges represent interactions. The application domains of graph-based models include coupled biological/chemical systems, social networks, software applications, and communication protocols [1]–[3].
In many real systems, unfortunately, the properties of their interacting units cannot be deterministically known in advance.
In these cases, random graphs [4] can be fruitfully used to infer the characteristics of the topology, based on the probabilistic behavior of vertice and edges (see also [5] for a comprehensive overview on the subject).
With reference to communication issues, random graphs have been mainly adopted to describe unstructured overlays [6]–[8], web properties [9], and Internet topology [10].
In this brief, we focus on diameter constrained overlays, i.e., virtual network topologies having a diameter no larger than a predefined threshold D. This kind of overlay is very useful to support delay sensitive applications, such as in Peer- to-Peer (P2P) TV [11] and emerging Machine-to-Machine (M2M) systems [12]. In fact, the higher the diameter D the higher the end-to-end communication delay [13]. The problem of building diameter constrained graphs has been thoroughly
L. A. Grieco is with the Department of Electrical and Information Engi- neering, Politecnico di Bari, Bari, Italy, e-mail: a.grieco@poliba.it
M. B. Alaya and T. Monteil are with CNRS, LAAS, and Univ. de Toulouse, Toulouse, France. K. Drira is with CNRS, LAAS, Toulouse, France. e-mail:
{ben.alaya, monteil, khalil}@laas.fr
afforded in [14] with reference to structured overlays, built upon distributed hash tables (DHT). Unfortunately, to the best of the authors’ knowledge, no theoretical contribution has been formulated yet, able to describe with closed form expressions the dynamics of an unstructured evolving overlay, subject to a constraint of the maximum diameter D. This kind of model could be very useful to enable closed loop autonomic management strategies as well as to characterize, in a tractable form, both transient and steady state properties of network topologies in M2M scenarios [12], [15] and beyond.
Starting from this premise, a theoretical model based on random graph is formulated herein, which considers a discrete time process of arrivals to describe the sequence of vertex couples among which a path composed of no more than D edges has to be established. Accordingly, a general topology formation mechanism M is formulated, expressing the rules that drive the addition of new edges, obeying to the constraint on the maximum diameter D. Then, exploiting the properties of the binary adjacency matrix A in graph theory [16], an original and tractable discrete time model is proposed that describes the evolution of the average network degree (i.e., the number of edges per node) subject to M and D. The model is successfully validated using computer simulations in a wide range of scenarios (with up to 2
16nodes). Finally, concrete examples are provided to illustrate useful applications of the proposed approach. They include: (i) the derivation of an approximated upper bound
D√
2 · N · lnN on graph average degree (i.e., the average number of edges per vertex);
(ii) the comparison with respect to delay optimal de Bruijn graphs [14]; (iii) the analysis of the graph robustness; (iv) the derivation of system dynamics in presence of edge failures.
The rest of the brief is organized as follows: the main theoretical achievement is presented in Sec. II and validated in Sec. III. Useful examples of its applications are described in Sec. IV. The last Sec. V closes the brief and draws future research.
II. M ODEL
A. Target Scenario and Notation
The target scenario considered in this brief consists of a graph of N vertice, n
qbeing the q-th vertix (q ∈ [1, N ]).
Furthermore, an ordered sequence of equi-probable
1couples
1
It is worth to note that equi-probable arrivals (i.e., homogeneous con-
ditions) are usually assumed in the current literature dealing with diameter
constrained graphs [14]. In fact, if the vertice of the graph represent the
gateway through which the service of a large number of nodes are made
available (as in M2M systems [17]), it is not unlikely that the overlay that
inter-connect such gateways actually reflects this assumption.
of vertice is considered, among which a path composed of no more than D edges has to be established. The t-th couple is described by the vertice (n
it, n
jt). For sake of simplicity, the variable t will be referred to as time from now on.
Knowing the t-th couple, a new edge is established in the graph if and only if the two vertice (n
it, n
jt) are not reciprocally reachable in no more than D edges. Knowing, the number of edges l
t−1at time t − 1, the probability that a couple of vertice at time t will not be reciprocally reachable in no more than D edges is defined as P
t−1. Notice that, since we are assuming homogeneous conditions, P
t−1is the same for all the possible couples (n
it, n
jt).
Accordingly, our model is grounded on the following equa- tion:
l
t+1= l
t+ P
t(1) which, considering that the average degree [4] (i.e., the number of edges per vertex) is k
t=
2N·lt, can be also expressed as:
k
t+1= k
t+ 2
N P
t(2)
The presence of an edge between any couple of vertice at time t will be expressed (as usual in graph theory) using the binary symmetric adjacency matrix A
N xNt, so that A
t(i, j) = A
t(j, i) = 1 if and only if an edge between n
iand n
jexists at time t (otherwise A
t(i, j) = A
t(j, i) = 0).
TABLE I N
OTATION.
Symbol Meaning
N Number of vertice k
tAverage degree at time t n
qq-th vertex
D Maximum diameter
(n
it, n
jt) t-th couple of vertice wishing to establish a path l
tNumber of edges at time t
w
tNumber of path with less than D + 1 edges between a couple of vertice at time t
P
t−1Probability that no path exists shorter than D+1 edges between the vertice (n
it, n
jt)
A
N xNtSymmetric binary adjacency matrix at time t P r { x } Probability of event x
ˆ
x Upper bound on x
To provide an illustrative example of the networked system we are modeling as a random graph, Fig. 1 shows the evolution of a graph made of N = 5 vertice and constrained by D = 2 max path length. In this example, the ordered sequence of vertice (n
it, n
jt) is: (n
2, n
4), (n
1, n
4), (n
1, n
2), (n
4, n
5), (n
2, n
3), and (n
1, n
3). Accordingly, for each of them, a new edge is added if and only if a path shorter than 3 edges is not already available among corresponding vertice. In the sequel of the contribution, we will derive a law that rule the evolution of this kind of graphs in a general case.
n1 n2
n3
n4 n5
t = 0 (a)
n1 n2
n3
n4 n5
t = 1 (b)
n1 n2
n3
n4 n5
t = 2 t = 3 (c)
n1 n2
n3
n4 n5
t = 4
(d)
n1 n2
n3
n4 n5
t = 5
(e)
n1 n2
n3
n4 n5
t = 6
(f)
Fig. 1. Evolution of a random graph (N = 5, D = 2): a) initial state; b) the first edge is added at t = 1 to connect vertice n
2and n
4; c) the second edge is added at t = 2 to connect vertice n
1and n
4, but no edge is added at t = 3 because the vertice n
1and n
2(asking for a connection) are already connected by a path of 2 hops ≤ D; d) the third edge is added at t = 4 to connect vertice n
4and n
5; e) the fourth edge is added at t = 5 to connect vertice n
2and n
3; e) the fifth edge is added at t = 6 to connect vertice n
1and n
3, for which the only existing path was longer than D hops.
B. Main result
Proposition 1. For a sufficiently large N , the following ex- pression describes the dynamics of the average graph degree:
k
t+1≈ k
t+ 2 N · exp
(
− 1
N · k
D+1t− k
tk
t− 1
)
(3) Proof. The model considered here is based on Eq. (1), or equivalently on finding an accurate approximation for the probability P
t. The latter expresses the probability to find a path at time t (no longer than D edges) between a generic couple of vertice (n
it+1, n
jt+1), knowing that the number of already existing edges is l
t.
To fulfill this objective, we first leverage a well known property of the matrix A
t: A
ct(i, j) = 0, c ∈ N
+, if and only if no path composed of c edges exist between n
iand n
jat time t [16].
In this way, without lack of generality, P
tcan be expressed as follows:
P
t=
∏
Dc=1
P r { A
ct(i
t+1, j
t+1) = 0 } (4) Now, given that 2 · l
telements are equal to one in A
t, it yields P r { A
t(i, j) = 1 } =
2N·l2t. Also, since any element of A
ctis no other than the sum of N
c−1elements, each one being a product of c coefficients belonging to A
t, we can approximately write:
P r { A
ct(i
t+1, j
t+1) = 0 } ≈ [
1 − ( 2 · l
tN
2)
c]
Nc−1(5)
Now, recalling that (1 +
1x)
x→ e, when x → ∞ , for a sufficiently large N , Eq. (5) can be written as:
P r { A
ct(i
t+1, j
t+1) = 0 } ≈ exp (
− N
c−1· ( 2 · l
tN
2)
c)
(6) Accordingly, by substituting (6) in (4), it is obtained:
P
t≈ exp (
−
∑
Dc=1
N
c−1· ( 2 · l
tN
2)
c)
(7) which, after a little algebra, becomes
P
t≈ exp (
− 1
N · (
2N·lt)
D+1−
2N·lt2·lt N
− 1
)
(8) From [4], the average degree can be expressed as k
t=
2N·lt, so that we obtain the proof by substituting (8) in (2).
III. N UMERICAL V ALIDATION
To validate the model (3), we have considered a complex scenario composed of N vertice (with N ranging from 2
5to 2
16) and D ranging from 3 to 10. Using an ad hoc simulator we developed in Matlab, the relative error between the real evolution of the degree k(t) and the one estimated using (3) for all t is evaluated. In any case, we found that the average relative error is below 10% if we consider the entire evolution of k(t). Also, the relative error at steady state (once the graph is completely formed), for D ≤ 5, is below 10%, whatever N . Finally, we notice a slight increase in the relative error as D increases: (in any case) it remains smaller than 25% and it falls below 20% for N > 2
12.
To provide an illustrative example, Fig. 2 plots the dynamic evolution of the number of edges versus the time t (similar results have been obtained for different values of N and D so that the average relative error is below 10% in all cases).
100 101 102 103 104 105
100 101 102 103 104
t
Number of Edges
Estimated x Real
x
x
x
x
Fig. 2. Evolution of the number of edges over the time t, (N = 1000, D = 5).
It is worth to note that the number of edges linearly increases with t till a saturation point is reached. From that moment on, l exhibits a very slow rise. This can be explained by plotting also the values of the probability P
t. Fig. 3 shows that P
tis almost equal to one for some time during the network formation, meaning that, since the number of edges is low, it is highly likely to add a new edge as soon as a new couple of nodes needs to establish a path. At the same time, the values
Algorithm 1 Validation Code
procedure S IMULATE G RAPH F ORMATION (N ,D,stop) ◃ stop: stop condition
l(0) ← 0 ◃ Initial number of edges est
l(0) ← 0 ◃ Estimated initial number of edges counter ← 0 ◃ Counter initial value A ← 0
N xN◃ Adjacency matrix initial value while !stop do ◃ The procedure is run until the stop condition is verified
i ← randi(N ) ◃ An integer random number between 1 and N is assigned to i
j ← randi(N ) if i ̸ = j then
counter ← counter + 1
est
l(counter) ← est
l(counter) + P
counterd ← shortestpath(A, i, j)◃ d is the length of the shortest path from n
ito n
jif d < D + 1 then A(i, j) ← 1;
l(counter) ← l(counter − 1) + 1 else
l(counter) ← l(counter − 1) end if
end if end while end procedure
of P
tabruptly decreases after a certain t, meaning that the topology reached the steady state.
100 101 102 103 104 105
10-3 10-2 10-1 100
t
Pt
Fig. 3. Evolution of P
t, (N = 1000, D = 5).
To provide a further insight, Fig. 4 pictures the evolution of a random graph (N = 1000, D = 5): (a) at the beginning of the simulation, when no edge is present; (b) during the transient, when a few edges have been created and a new edge is added; and (c) at steady state, when all required paths (no longer than D edges) have been already created.
IV. E XAMPLE A PPLICATIONS
A. Rank bound and convergence
Theorem 1. Being ˆ k the maximum degree k in system (3), it can be bounded as follows:
ˆ k ≤
D√
2 · N · lnN . (9)
(a)
(b)
(c)
Fig. 4. Evolution of a random graph (N = 1000, D = 5): a) initial state; b) during the transient a new edge is added; c) at steady state no edge is added because paths no longer than D hops already exist.
Proof. The way we are building the overlay is so that an edge between a couple of vertice (n
it, n
jt) is formed or not based only upon the first time that couple issues a request for a path.
If a path shorter than D + 1 hops already exists the edge is not established otherwise it is established. From that moment on, the next requests for a path issued by the same couple of vertice will not sort any effect.
Based on this consideration, we extract from the sequence of equi-probable couples of vertice considered in the brief, the sequence of instants in which any couple of vertice appears for the first time. Of course, the length of such a sequence of time instants will be composed of at most N(N − 1)/2 elements.
In order to estimate an upper bound on the steady state average degree ˆ k, it is necessary to consider that at time t, 1/P
texpresses the average time required to establish the next edge in the overlay.
Under this assumption, the expression of P
tto consider is slightly different from that in Eq. (8) because the sequence of vertix couples we are considering to proof this Theorem is chosen in such a way that no one edge path exists at time t for (n
it, n
jt). The avoid ambiguity, we will refer to P
t′to refer to this new probability. Accordingly, it follows:
P
t′=
∏
Dc=2
P r { A
ct(i
t+1, j
t+1) = 0 } (10) which, following the same passages reported in the proof of Proposition 1, can be also written as:
P
t′≈ exp (
− 1
N · (
2N·lt)
D+1− (
2N·lt)
22·lt N
− 1
)
(11) Therefore to estimate an approximated upper bound on ˆ k, it is sufficient to find any value of k
tso that
P1′t
≥ N (N − 1)/2, which gives ∑
c=2D
k
tc≥ 2 · N · lnN − N · ln2. Notice that the latter inequality is satisfied if k
Dt≥ 2 · N · lnN, from which the proof follows.
Remark 1. It is worth remarking that, the bound k ˆ can be fruitfully exploited to compare the properties of the graph under study with respect to well known graph. To this end, if we consider as ground for comparison the delay optimal de Bruijn graphs, representing one of the most compact topologies discovered so far [14], we will find that, for the same diameter D, the degree of the unstructured overlay considered in this brief is only
D√
2 · lnN times larger at most, even if it is based on a much simpler construction mechanism.
B. Robustness
Knowing that the graph construction model adopted herein
ensures, at steady state, at least one path shorter than D + 1
edges between any couple of nodes, it is worth investigating
how many paths (composed of less than D + 1 edges) are
present between any couple of nodes. This metric is intimately
related to the topology robustness: the higher the number of
paths the higher the number of alternative solutions to route messages in case of failures.
Theorem 2. Defined as w
tthe number of paths composed of less than D + 1 edges between any couple of nodes at time t, it holds:
w
t= 1
N · k
D+1t− k
tk
t− 1 (12)
Proof. Also in this case the properties of the adjacency matrix are exploited. In particular, A
ct(i, j) indicates the number of paths composed of c edges between the vertice n
iand n
j. Thus, considering that the average value of any element if A is
2N·l2t, it holds:
w
t= 1 N ·
∑
Ds=1